Thaier Hayajneh

According to our database1, Thaier Hayajneh authored at least 44 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Cyber Security in Social Media: Challenges and the Way Forward.
IT Professional, 2019

Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare.
IEEE Internet of Things Journal, 2019

Evolution of Format Preserving Encryption on IoT Devices: FF1+.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Security and Privacy Issues with IoT in Healthcare.
EAI Endorsed Trans. Pervasive Health Technol., 2018

Security Vulnerabilities in Bluetooth Technology as Used in IoT.
J. Sensor and Actuator Networks, 2018

Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.
J. Medical Systems, 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Generation Comp. Syst., 2018

A Review of Facial Biometrics Security for Smart Devices.
Computers, 2018

Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques.
IEEE Access, 2018

Exploring Problems with Virtualization in Cloud Computing.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Systems Journal, 2017

Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap.
Sensors, 2017

KeyStroke logs: Are strong passwords enough?
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Reevaluating the effectiveness of visual cues for website security.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Security and privacy issues affecting cloud-based IP camera.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Detection and prevention of crypto-ransomware.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Security issues with certificate authorities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security and Attack Vector Analysis of IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

CAre: Certificate Authority Rescue Engine for Proactive Security.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Electromagnetic Warfare and the Cybersecurity Threat.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A Framework for Zero Day Exploit Detection and Containment.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Sensors, 2016

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Security and Communication Networks, 2016

A comparative study of steganography designs based on multiple FPGA platforms.
IJESDF, 2016

2015
A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks.
MONET, 2015

A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Network and Computer Applications, 2015

Security Issues in WSNs with Cooperative Communication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A survey of wireless technologies coexistence in WBAN: analysis and open research issues.
Wireless Networks, 2014

An energy-efficient and security aware route selection protocol for wireless sensor networks.
Security and Communication Networks, 2014

QoS-Aware Health Monitoring System Using Cloud-Based WBANs.
J. Medical Systems, 2014

Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
Journal of Circuits, Systems, and Computers, 2014

Analysis and Evaluation of Random Placement Strategies in Wireless Sensor Networks.
Journal of Circuits, Systems, and Computers, 2014

A cloud-based interference-aware remote health monitoring system for non-hospitalized patients.
Proceedings of the IEEE Global Communications Conference, 2014

Public-Key Authentication for Cloud-based WBANs.
Proceedings of the 9th International Conference on Body Area Networks, 2014

2013
Hierarchical steganography using novel optimum quantization technique.
Signal, Image and Video Processing, 2013

Wavelet-transform steganography: algorithm and hardware implementation.
IJESDF, 2013

2012
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies.
MONET, 2012

2011
Source - destination obfuscation in wireless ad hocnetworks.
Security and Communication Networks, 2011

2009
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the Third International Conference on Network and System Security, 2009

On limited-range strategic/random jamming attacks in wireless ad hoc networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009


  Loading...